Learn Unix and Linux security assessment methodologies. This appendix covers the evaluation of Unix-based systems including authentication, file permissions, and common vulnerabilities.
Topics Covered
- F1 User Enumeration - Identifying Unix users and groups
- F2 Unix Vulnerabilities - Common Unix/Linux security weaknesses
- F3 File System Permissions - Understanding and exploiting file permissions
- F4 Unix Passwords - Password storage, shadow files, and cracking